In: Computer Science
(a). As an intern at Access Bank Ghana Ltd, you are tasked to investigate and produce a report on the rampant interrupts and traps that the company’s computer systems have been experiencing.
(i). In your own words, clearly distinguish between (α). interrupts and (β) traps, in the context of computer systems in banking environments.
(ii).Using practical examples in banking environments, discuss situations that can often cause interrupts and/or traps when people are using computer systems, and in each situation, suggest appropriate solution(s) to the interrupt and/or trap. Put your answers to (i) and (ii) above in the form of a report to Access Bank management
(b). These days, many computer users (individuals and organizations) prefer to buy and use symmetric multiprocessing systems for their operations.
(i). In your own words, discuss four reasons, in the context of business and technology, why this is so.
(ii). Use practical examples to illustrate your answer for in (i)
(a). As an intern at Access Bank Ghana Ltd, you are tasked to investigate and produce a report on the rampant interrupts and traps that the company’s computer systems have been experiencing.
(i). In your own words, clearly distinguish between
(α). Interrupts: Interrupts are kind of exception that occur at random times during the execution of a program, in response to signals from hardware (devices like the hard disk, graphics card, I/O ports, etc.). System hardware uses interrupts to handle events external to the processor, such as requests to service peripheral devices. These interrupts generally have nothing to do with the instructions currently executing; instead, some event, such as pressing a key on the keyboard or a time out on a timer chip, informs the CPU that a device needs some attention. The CPU interrupts the currently executing program, services the device, and then returns control back to the program. Software can also generate interrupts by executing the INT n instruction. Interrupts are asynchronous as they do not trigger at predictable places in the user code and are passive as the interrupt handler has to wait for them to happen eventually. Interrupts are very common in time shared multiuser software systems used in banking environments. For example, a system clock chip may generate an interrupt every 100 milliseconds to allow the kernel to implement time sharing.
(b) Traps: Traps are exceptions in user processes. For example, a trap can be caused by division by zero or invalid memory access. It is also the usual way to invoke a kernel routine (a system call) because those run with a higher priority than user code. Exception handling of this kind is synchronous and is active. When a trap happens, the user code is suspended for executing the trap handling routine and the user process continues once the execution of the exception handling routine is over. Traps are active in the sense that most of the time, the code expects the trap to happen.
(ii).Using practical examples in banking environments, discuss situations that can often cause interrupts and/or traps when people are using computer systems, and in each situation, suggest appropriate solution(s) to the interrupt and/or trap. Put your answers to (i) and (ii) above in the form of a report to Access Bank management.
In the context of Axis Bank, where a multiuser shared software is running, interrupts can happen every milliseconds. For example:
· Input device (Keyboard, mouse, scanners, disk and interfacing devices) interrupts are happening every milliseconds when the multiple bank personnel concurrently interacts with system
· Output device (printers, disks, interfacing devices) interrupts are happening every milliseconds when the multiple bank personnel concurrently interacts with system
· System clock chip is generate an interrupt every 100 milliseconds to allow the kernel to implement time sharing.
Similarly, traps are happening continuously, in a multiuser shared concurrent system like Axis Bank system. These include:
· User processes requiting for kernel operations
· Processes errors related to input errors, including division by zero, data mismatch, invalid range of data, etc.
· Each time when the process attempts to access an illegal memory address
· Each time when attempting to execute an illegal opcode
(b). These days, many computer users (individuals and organizations) prefer to buy and use symmetric multiprocessing systems for their operations.
(i). In your own words, discuss four reasons, in the context of business and technology, why this is so.
Symmetric multiprocessing involves a multiprocessor computer hardware and software architecture where two or more identical processors are connected to a single, shared main memory. All of these processors work in tandem to execute processes. The operating system treats all the processors equally, and no processor is reserved for special purposes.
Most multiprocessor systems today use symmetric multiprocessor architecture. The major reasons for employing symmetric multiprocessor architecture include:
· Cost-Effective Way to Maximize Throughput: In symmetric multiprocessor architecture systems, all of the processors are tightly coupled inside the same box with a bus or switch. Components like memory, disks, and I/O devices are shared are globally shared. Only one copy of an OS runs on all the processors. Because of these features, multiprocessor architecture systems are cost-effective ways to increase throughput.
· Support Parallel Programming: To solve different problems and tasks, symmetric multiprocessor architecture applies multiple processors to that one problem, known as parallel programming.
· Time-Sharing Mode: Symmetric multiprocessing is useful for time sharing systems as these have multiple processes running in parallel.
· Higher Reliability: Symmetric multiprocessing systems are much more secure and reliable than single processor systems. Even if a processor fails, the system still endures. Only its efficiency is decreased a little.
· Easier to Implement Security Features: It is relatively easier to implement security features in symmetric multiprocessing systems as compared other types of distributed multiprocessor architecture due to the tightly coupled nature of the system
(ii). Use practical examples to illustrate your answer for in (i)
The features supported by the symmetric multiprocessing systems can be positively exploited positively for the benefit the institution that employs such architecture. Practical examples include:
· Organizations can employ the symmetric multiprocessing systems for cost-effective scalability. For example, in a new branch of the business is started, the system can be easily scaled to meet the new requirements.
· Requirements where high level computations are involved, for example, scientific computing, weather forecast, etc., symmetric multiprocessing systems can be used in parallel computing architecture.
· In environment where a large number of users are interacting with the system, for example, a bank with multiple branches across the world, could use the symmetric multiprocessing systems in time shared mode to meet the computing requirements of the users.
· In application where high degree reliability is needed, for example time critical banking and other business applications, symmetric multiprocessing systems can be employed as it can guarantee reliable access.
· In application where high degree security is needed, for example secure banking and other business applications, symmetric multiprocessing systems can be employed as it can guarantee higher security level